13 Reference

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

REFERENCES

1. Aderounumu, G.A., Oyatokun, B.O. and Adigum, M.O. “Remote


Method Invocation and Mobile Agent: A Comparative Analysis”, The
Journal of Issues in Informing Science and Information Technology,
Vol. 3, pp. 1-11, 2006.

2. Aglet, http://www.aglets.sourceforge.net/., 2004.

3. Axel, B., Barbara, E., Alice, H., Wilmuth, M. and Martin, W. “A Test
Suite for the Evaluation of Mobile Agent Platform Security”,
Proceedings of the IEEE/WIC/ACM International Conference on
Intelligent Agent Technology (IAT'06), pp. 752-756, 2006.

4. Beheshti, S., Ghiasabadi, M., Sharifnejad, M. and Movaghar, A.


“Fault Tolerant Mobile Agent Systems by Using Witness Agents and
Probes”, Proceedings of 4th International Conference: Sciences of
Electronic, Technologies of Information and Telecommunications
(SETIT 2007), Tunisia, pp. 1-5, 2007.

5. Braun, P. and Rossak, R. “Mobile Agents: Basic Concepts, Mobility


Models and the Tracy Toolkit”, dpunkt.verlag, Elsevier, 2005.

6. Carles Garrigues, Nikos Migas, William Buchanan, Sergi Robles and


Joan Borrell, “Protecting mobile agents from external replay attacks”,
Journal of Systems and Software, Elsevier Standards, Vol. 82, No. 2,
pp. 197-206, February 2009.

7. Chen, Z. “Java Card Technology for Smart Cards: Architecture and


Programmer’s Guide. The Java Series”, Addison Wesley, 1st Edition,
September 2000.

8. Cheng, J. and Wei, V. “Defenses Against the Truncation of


Computation Results of Free-Roaming Agents”, Proceedings of 4th
International Conference on Information and Communications
Security, Lecture Notes in Computer Science, Vol. 2513, pp. 1-12,
2002.
9. Corradi, A., Montanari, R. and Stefanelli, C. “Mobile Agents
Protection in the Internet Environment”, Proceedings of 23rd Annual
International Computer Software and Applications Conference
(COMPSAC ’99), pp. 80-85, 1999.

10. Danny B. Lange and Mitsuru Oshima, “Programming and Developing


Java Mobile Agents with Aglets”, Addison Wesley publication, 1999.

11. Dnyaneshwar Rangnath, M. “Mobile Agent Security-Aglet Platform,


M.Tech.,Thesis, Department of Computer Engineering”, NIT
Karnataka, 2010.

12. Etziani, O. and Weld, D. “Intelligent Agents on the Internet: Fact,


fiction and forecast”, IEEE Expert, Vol. 10 No. 4, pp.44-49, 1995.

13. Farmer, W., Guttman, J. and Swarup, V. “Security for Mobile Agents:
Issues and Requirements”, Proceedings of the 9th National Information
Systems Security Conference, pp. 591-597, Baltimore, October 1996.

14. Ford,B. and Karmouch, A. “An Architectural Model for Mobile


Agent-Based Multimedia Applications”, Proceedings of the Canadian
Conference on Broadband Research. Ottawa, 1997.

15. Fugetta, A., Picco, G.P. and Vigna, G. “Understanding Code


Mobility”, IEEE Transaction on Software Engineering, Vol. 24 No. 5,
1998.

16. Funfrocken, S. and Mattern, F. “Mobile Agents as an Architectural


Concept for Internet-based Distributed Applications – The WASP
Project Approach”, Proceedings of KiVS’99. Steinmetz. Springer-
Verlag, pp. 32-43, 1999.

17. Gong, L. “JavaTM 2 Platform Security Architecture”, World Wide


Web. http://java.sun.com/j2se/1.4/docs/guide/security/spec/ security-
spec.doc.html, 2002.

18. Gray, J. and Reuter, A. “Transaction Processing: Concepts and


Techniques”, The Morgan Kaufmann Series in Data Management
System, 1993.

19. Gray R. S., Cybenko G., Kotz D., Peterson R.A. and Rus D.
“D’Agents: Applications and Performance of a Mobile Agent System
Software-Practice and Experience”, Vol. 32, No. 6, pp. 543-573, May
2002.
20. Hacini, S., Zahia, G. and Boufaida, Z. “TAMAP: a New Trust-based
Approach for Mobile Agent Protection”, Journal in Computer
Virology, Vol. 3 No. 4, pp. 267-283, 2007.

21. Hijazi, A. and Nasser, N. “Using Mobile Agents for Intrusion


Detection in Wireless ad hoc Networks”, Proceedings of the 2nd IFIP
International Conference on Wireless and Optical Communications
Networks (WOCN ’05), IEEE Computer Society, pp. 362-366, 2005.

22. Hoffmann, M., Peters, J. and Pinsdorf, U. “Multilateral Security in


Mobile Applications and Location Based Services”, Proceedings of
the Europe’s Independent IT Security Conference (ISSE 2002). Paris,
France, 2002.

23. Hohl, F. “Mobile Agents and Active Networks”, Proceedings of the


IFIP Fifth International Conference on Intelligence in Networks
(SMARTNET ’99), Pathumthani, Thailand, pp. 45-51, 1999.

24. Hohl, F. “Time Limited Blackbox Security: Protecting Mobil Agents


From Malicious Hosts”, In Vigna, G. “Mobile Agent Security”, Vol.
1419 of Mobile Agents and Security, pp. 92-113. Springer –Verlag,
Berlin Heidelberg, New York, 1998.

25. Horvat, D. , Cvetkovic D. , Milutinovic V. , Kocovic P. and


Kovacevic V. “Mobile Agents and Java Mobile Agents Toolkits”,
Proceedings of the 33rd Hawaii IEEE International conference on
System Sciences (HICSS)-2000, Maui, Hawaii, USA, January 2000.

26. Jansen, W.A. “Determining Privileges of Mobile Agents”,


Proceedings of 17th Annual Computer Security Applications
Conference (ACSAC 2001), pp. 149-158, 2001.

27. Jansen, W.A and Karygiannis, T. “NIST Special Publication 800-19 –


Mobile Agent Security”, (National Institute of Standards and
Technology, Computer Security Division, Gaithersburg), 2000.

28. Jansen, W.A. “Countermeasures for Mobile Agent Security”,


International Journal on Computer Communications, Vol. 23. No. 17,
pp. 1667-1676, 2000.

29. Jha, R. and Iyer, S. “Performance Evaluation of Mobile Agents for E-


Commerce Application”, Lecture Notes in Computer Science,
Vol. 2228, pp. 331-340, 2001.
30. Jiang, Y.C., Xia, Z.Y., Zhong, Y.P. and Zhang, S.Y. “Defend Mobile
Agent Against Malicious Hosts in Migration Itineraries”, International
Journal of Microprocessors and Microsystems, Vol. 28, No. 10,
pp. 531-546, 2004.

31. Joseph, T. and Luis, V. “Mobile Agent Security and Telescript”,


Proceedings of the 41st IEEE International Computer Conference,
1063-6390/96, Washington, DC, USA, pp.58-63, 1996.

32. Karjoth, G., Asokan, N. and Gulcu, C. “Protecting the Computation


Results of Free Roaming Agents”, Proceedings of Second
International Workshop on Mobile Agents (MA’98), Rothermel K.
and Hohl F. (Eds.), LNCS, Vol. 1477, pp. 195-207, 1998.

33. Karnik, N. “Security in Mobile Agent Systems”, Ph.D Dissertation,


University of Minnesota, 1998.

34. Karnik, N.M. and Tripathi, A.R. “Security in the Ajanta Mobile Agent
System”, Technical Report TR-5-99, University of Minnesota,
Minneapolis, MN 55455, U.S.A. 1999.

35. Klusch, M., Lodi, S. and Moro, G. “Agent-based Distributed Data


Mining: the KDEC Scheme. Intelligent Information Agents: the Agent
Link Perspective”, LNCS, Springer, Berlin, Vol. 2586, pp. 104-122,
2003.

36. Kotzanikolaou, P., Burmester, M. and Chrissikopoulos, V. “Secure


Transactions with Mobile Agents in Hostile Environments”,
Proceedings of Australian Conference on Information Security and
Privacy, Lecture Notes in Computer Science, Vol. 1841, pp. 289-297,
2000.

37. Kuang, H., Bic, L.F. and Dillencourt, M.B. “Iterative Grid-based
Computing Using Mobile Agents”, Proceedings of the International
Conference on Parallel Processing (ICPP ’02), pp. 109-117, 2002.

38. Kumari, V., Aditya Kumar, Y., Raju, K.V.S.V.N., Ramana, K.V. and
Prasad, R.V.V.S.V. “Policy Based Controlled Migration of Mobile
Agents to Untrusted Host”, Proceedings of the 3rd International
Conference on Intelligent Information Hiding and Multimedia Signal
Processing (IIHMSP- 2007), pp. 550-553, 2007.

39. Lange, D.B. and Aridor, Y. “Agent Transfer Protocol - ATP/0.1”,


IBM Tokyo Research Laboratory, Draft No.4, 1997.
40. Lange, D.B. and Oshima, M. “Seven Good Reasons for Mobile
Agents”, ACM Communications, Vol. 45, No. 3, pp. 88-89, 1999.

41. Lange, D.B. “Mobile Object and Mobile Agents: The future of
Distributed Computing”, Proceedings of the European Conference on
Object Oriented Programming (ECOOP’98). Brussels, Belgium,
Invited Talk, 1998.

42. Levy, R., Carlos, P.S., Teittinen, A., Haynes, L.S. and Graff, C.J.
“Mobile Agents Routing – a Survivable ad-hoc Routing Protocol”,
Proceedings of the IEEE military communications conference
(MILCOM ’05), IEEE Computer Society, Vol. 5, pp. 2903-2909,
2005.

43. Libes, D. “Obfuscated C and Other Mysteries”, John Wiley and Sons,
USA, Book and Disk Edition, 1992.

44. Loureiro, S., Molva, R. and Pannetrat, A. “Secure Data Collection


with Updates”, Electronic Commerce Research, Vol. 1, No. 1, Issue 2,
pp. 119-130, 2001.

45. Lu, T. and Fu, M. “Using Mobile Agents for Object Sharing in P2P
Networks”, Proceedings of the 1st International Conference on
Innovative Computing, Information and Control (ICICIC ’06), Vol. 1,
pp. 741-744, 2006.

46. Ma, L., Jeffrey, J. and Tsai, J. P. “Security Modeling and Analysis of
Mobile Agent Systems”, Imperial College Press, 2006.

47. Malkhi, D. and Reiter, M.K. “Secure Execution of Java Applets Using
a Remote Playground”, Proceedings of the 1998 IEEE Symposium on
Security and Privacy, Oakland, CA, pp. 40-51, 1998.

48. Manvi, S.S. and Venkataram, P. “Mobile Agent Based Approach for
QoS Routing”, IET Communication, Vol. 1, No. 3, pp. 430-439, 2007.

49. McDonald, J.T., Yasinsac, A. and Thompson, W. “Mobile Agent Data


Integrity using Multi-agent Architecture”, Proceedings of the
International Workshop on Security in Parallel and Distributed
Systems (PDCS 2004), San Francisco, CA, pp. 14-17, 2004.

50. Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S.,
Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C.,
Virdhagriswaran, S. and White, J. “MASIF: The OMG Mobile Agent
System Interoperability Facility”, Proceedings of the Second
International Workshop, MA'98, LNCS, Vol. 1477, pp. 50-67.
Springer - Verlag, 1998.

51. Minar, N. “Designing an ecology of distributed agents”, Master


Thesis, Massachusetts Institute of Technology, 1998.

52. Minsky, Y., Renesse, R.V., Schneider, F.B. and Stoller, S.D.
“Cryptographic support for fault-tolerant distributed computing”,
Proceedings of the 7th ACM SIGOPS European Workshop, ACM
Press, USA, pp. 109-114, 1996.

53. Mohindra, A., Purakayastha, A. and Thati, P. “Exploiting Non


determinism for Reliability of Mobile Agent Systems”, Proceedings of
International Conference on Dependable Systems and Networks, New
York, pp. 144-153, 2000.

54. Necula, G. “Proof-carrying code”, Conference Record of POPL’97:


the 24th ACM SIGPLAN-SIGACT Symposium on Principles of
Programming Languages, Paris, France, pp. 106-119, 1997.

55. Object Management Group, “Agent Technology Green Paper”, Agent


Working Group, OMG Document ec/2000-08-01, 2000.

56. Ordille, C., Benjamin, G., Colin, H., David, L., Colin, P. and Gene, T.
“Itinerant Agents for Mobile Computing”, IEEE Personal
Communications, Vol. 2, No. 5, pp. 34-49, 1995.

57. Ordille, J.J. “When Agents Roam, Who Can You Trust?”, Proceedings
of the First Conference on Emerging Technologies and Applications
in Communications, Portland, Oregon, pp. 188-191, 1996.

58. Pals, H., Petri, S. and Grewe, C. “FANTOMAS – Fault Tolerance for
Mobile Agents in Clusters”, Proceedings of International Parallel and
Distributed Processing Symposium (IPDPS 2000), pp. 1236-1247,
2000.

59. Paul, A. “Authorization for a Large Heterogeneous Multi-Domain


System”, Proceedings of the Australian Unix and Open Systems
Group National Conference, pp. 159-169, 1997.

60. Pears, S., Xu, J. and Boldyreff, C. “Mobile Agent Fault Tolerance for
Information Retrieval Applications: An Exception Handling
Approach”, Proceedings of Sixth International Symposium on
Autonomous Decentralized Systems (ISADS’03), pp. 115-124, 2003.
61. Picco, G.P. “Mobile agents: An Introduction”, Journal of
Microprocessors and Microsystems, Vol. 2, No. 2, pp. 65-74, 2001.

62. Pleisch, S. and Schiper, A. “Modeling Fault-Tolerant Mobile Agents


as a Sequence of Agreement Problems”, Proceedings of 19th
Symposium on Reliable Distributed Systems (SRDS), Nuremberg,
pp. 11-20, 2000.

63. Ramya, . “Mobile Agent Security Issues” Technical Report,


Department of Computer Science, Oregon State University, pp. 1-10,
2000.

64. Robles, S. “Applying Mobile Agents Systems into Large Scale


Voting System Designing”, Master’s thesis, Universitat Autonoma de
Barcelona, Catalan, 1999.

65. Roth, V. “Secure Recording of Itineraries Through Cooperating


Agents”, Proceedings of the ECOOP Workshop on Distributed Object
Security and 4th Workshop on Mobile Object Systems: Secure
Internet Mobile Computations, pp. 147-154, 1998.

66. Rothermel, K. and Strasser, M. “A Fault-tolerant Protocol for


Providing the Exactly-once Property of Mobile Agents”, Proceeding
of 17th IEEE Symposium on Reliable Distributed Systems 1998
(SRDS “98), IEEE Computer Society, pp. 100-108, 1998a.

67. Rothermel, K. and Strasser, M. “Reliability Concepts for Mobile


Agents”, International Journal of Cooperative Information Systems
(IJCIS), Vol.7, No. 4, pp. 355-382, 1998b.

68. Ruchuan, W., Kaicui, S., Dengying, S. and Liyang, Y. “The Research
of Mobile Agent Protection Based on JavaCard”, Chinese Journal of
Computers, Vol. 24, No. 4, pp. 492-499, 2004.

69. Sander, T. and Christian, F. Tschudin “Protecting Mobile Agents


Against Malicious Hosts”, In Mobile Agents and Security, pp. 44-60,
Springer – Verlag, 1998.

70. Sau-Koon Ng, “Protecting Mobile Agents Against Malicious Hosts”,


M.Phil. Thesis, The Chinese University of Hong Kong, 2000.

71. Schneider, F. “Towards Fault-Tolerant and Secure Agent”,


Proceedings of 11th International Workshop on Distributed
Algorithms, Saarbrucken, pp. 1-14, 1997.
72. SeMoA, http://www.semoa.org., 2003.

73. Shao, M. and Zhou, J. “Protecting Mobile-agent Data Collection


Against Blocking Attacks”, International Journal of Computer
Standards and Interfaces, Elsevier Standards, Vol. 28, No. 5,
pp. 600-611, 2006.

74. Silei, L., Jun, L. and Junmo, X. “A Novel Free-Roaming Mobile


Agent Security Mechanism by Trusted Computing Technology”,
Proceedings of the 2008 International Conference on Computer
science and Software Engineering, pp.721-724, 2008a.

75. Silei, L., Jun, L. and Junmo, X. “A Novel Free-Roaming Mobile


Agent Security Protocol Against Colluded Truncation Attacks”,
Proceedings of the 2008 IEEE International Conference on
Information and Automation, Zhangjiajie, China, pp. 348-353, 2008b.

76. Silva, F.M. and Popescu-Zeletin, P. “Mobile Agent-Based


Transactions in Open Environments”, IEICE Transactions on
Communications, Vol. E83-B, No. 5, pp. 973-987, 2000.

77. Silva, L.M., Batista, V. and Silva, J.G. “Fault-Tolerant Execution of


Mobile Agents”, Proceedings of International Conference on
Dependable Systems and Networks, New York, pp. 144-153, 2000.

78. Songsiri, S. “A New Approach for Computation Result Protection in


the Mobile Agent Paradigm”, Proceedings of the 10th IEEE
Symposium on Computers and Communications (ISCC 2005),
Murcia, Cartagena, Spain, pp. 575-581, 2005.

79. Strasser, M., Rothermel, K. and Maihofer, C. “Providing Reliable


Agents for Electronic Commerce”, Proceedings of Trends in
Distributed Systems for Electronic Commerce (TREC'98), LNCS,
Vol. 1402, Springer-Verlag, pp. 241-253, 1998.

80. Tay, B.H. and Ananda, A.L. “A Survey of Remote Procedure Calls’,
ACM SIGOPS Operating Systems Review, Vol. 24, No. 3, pp. 68-79,
1990.

81. Tripathi, A.R., Karnik, N.M., Vora, M.K, Ahmed, T. and Singh, R.D.
“Mobile Agent Programming in Ajanta”, Proceedings of 19th
International Conference on Distributed Computing Systems
(ICDCS’99), Austin, Texas, pp. 190-197, 1999.
82. Tripathi, A.R., Ahmed, T. and Karnik, N.M. “Experiences and Future
Challenges in Mobile Agent Programming”, Microprocessors and
Microsystems, pp. 121-129, 2001.

83. Unrh, A., Harjadi, H. and Bailey, J. “Semantic-Compensation-Based


Recovery in Multi-Agent Systems”, Proceedings of 2nd Symposium on
Multi-agent Security and Survivability, pp. 85-94, 2005.

84. Uwe G. Wilhelm. “A Technical Approach to Privacy Based on Mobile


Agents Protected by Tamper – Resistant Hardware”, Ph.D Thesis,
Ecole Polytechnique Federale de Lausaane, Switzerland, May 1999.

85. Venkatesan, S. and Chellappan, C. “Inaugurating Free-Roaming


Mobile Agent (FRoMA) Based Secured e-Health Model”, eHealth
International Journal, Vol. 4, No. 1, pp. 14-19, 2008.

86. Venkatesan, S. and Chellappan, C. “Free Roaming Mobile Agent


(FRoMA) Protection Against Multiple Attacks”, International Journal
on Communication Networks and Distributed Systems, Inderscience
Publishers, Vol. 3, No. 4, pp. 362-383, 2009.

87. Venkatesan, S. and Chellappan, C. “Protection of Mobile Agent


Platform through Attack Identification Scanner (AIS) by Malicious
Identification Police (MIP)”, Proceedings of the IEEE International
Conference on Emerging Trends in Engineering and Technology,
(ICETET'2008), India, pp. 1228-1231, 2008.

88. Venkatesan, S., Chellappan, C. and Dhavachelvan, P. “Performance


Analysis of Mobile Agent Failure Recovery in E-Service
Applications”, International Journal on Computer Standards and
Interfaces, Elsevier Standards, Vol.32, No.1-2,pp.38-43, 2010.

89. Venkatesan, S., Baskaran, R., Chellappan, C., Anurika Vaish and
Dhavachelvan, P. “Artificial Immune System Based Mobile Agent
Platform Protection”, International Journal on Computer Standards
and Interfaces, Elsevier Standards, Vol.35, No.4, pp.365-373, June
2013.

90. Vigna, G. “Mobile Agents: Ten Reasons for Failure”, Proceedings of


IEEE International Conference on Mobile Data Management
(MDM'04), pp. 298-299, 2004.

91. Vogler, H., Hunklemann, T. and Moschgath, M. “An Approach for


Mobile Agent Security and Fault Tolerance Using Distributed
Transactions”, Proceedings of International Conference on Parallel
and Distributed Systems (ICPADS'97), Seoul, pp. 268-274, 1997.

92. Wahbe, R., Lucco, S., Anderson, T.E. and Graham, S.L. “Efficient
Software-based Fault Isolation”, ACM SIGOPS Operating Systems
Review, Vol. 27, No. 5, pp. 203-216, 1993.

93. Wang, X. and Qi, H. “Mobile Agent Based Progressive Multiple


Target Detection in Sensor Networks”, Proceedings of the IEEE
International Conference on Acoustics, Speech, and Signal Processing
(ICASSP ’04), IEEE Computer Society, Vol. 2, pp. 285-288, 2004.

94. Wenyu Qu, Masaru Kitsuregawa, Hong Shen and Zhiguang Shan, “A
Novel Fault-Tolerant Execution Model By Using of Mobile Agents”,
Journal of Network and Computer Applications, Elsevier Standards,
Vol.32, No.2, pp.423 - 432, March 2009.

95. Wong, D., Paciorek, N., Walsh, T., DiCelie, J., Young, M. and Peet, B.
“Concordia: An Infrastructure for Collaborating Mobile Agents”,
Rothermel K. and Popescu-Zeletin R. (Eds.), Proceedings of
1st International Workshop on Mobile Agents (MA'97), LNCS, Berlin,
Germany, Vol. 1219, pp. 86-97, 1997.

96. Wong, T.Y., Chen, X. and Lyu, M.R. “Design and Evalution of
a Fault Tolerant Mobile Agent System”, IEEE Intelligent Systems,
Vol. 3, No. 3-4, pp. 32-38, 2004.

97. Wooldridge, M. “An Introduction to Multi-Agent Systems”,


Chichesler, UK: John Wiley and Sons, 2002.

98. Xavier, L. “Java Bytecode Verification: Algorithms and


Formalizations”, International Journal of Automated Reasoning,
pp. 1-40, 2003.

99. Xian, H. and Feng, D. “Protecting Mobile Agents Data using Trusted
Computing Technology”, International Journal of Communication and
Computer, Vol. 4, No. 3, pp. 44-57, 2007.

100. Xiaoping, W., Shen, Z. and Zhang, H. “The Mobile Agent Security
Enhanced by Trusted Computing Technology”, Proceedings of
Wireless Communications, Networking and Mobile Computing
(WiCOM 2006), Wuhan, pp. 1-4, 2006.

101. Xu, D., Harn, L., Narasimhan, M. and Luo, J. “An Improved Free-
Roaming Mobile Agent Security Protocol against Colluded Truncation
Attacks”, Proceedings of the 30th Annual international Computer
Software and Applications Conference(COMPSAC’06), Vol. 2,
pp. 309-314, 2006.

102. Yao, M. “A Security Architecture for Protecting Dynamic


Components of Mobile Agents”, Ph.D. thesis of Information Security
Research Centre, Faculty of Information Technology, Queensland
University of Technology, Australia, 2004.

103. Yao, M., Foo, E., Dawson, E.P. and Peng, K. “An Improved Forward
Integrity Protocol for Mobile Agents”, Proceedings of 4th
International Workshop on Information Security Applications (WISA
2003), LNCS, Vol. 2908, pp. 272-285, 2003.

104. Yee, B.S. “A Sanctuary for Mobile Agent”, Technical Report CS97-
537, UC San Diego, Department of Computer Science and
Engineering, 1997.

105. Zhong, X., Zhong, X.C. and Shen, H. “A Reliable and Secure
Connection Migration Mechanism for Mobile Agents”, Proceeding of
24th International Conference on Distributed Computing Systems
Workshops - W4: MDC (ICDCSW'04), pp. 548-553, 2004.

106. Zhou, J., Onieva, J. and Lopez, J. “Analysis of a Free Roaming Agent
Result-Truncation Defense Scheme”, Proceedings of 2004 IEEE
Conference on Electronic Commerce, San Diego, USA, IEEE
Computer Society Press, pp. 221-226, 2004a.

107. Zhou, J., Onieva, J. and Lopez, J. “Protecting Free Roaming Agents
Against Result-Truncation Attack”, Proceedings of 60th IEEE
Vehicular Technology Conference, Los Angles, USA, pp. 3271-3274,
2004b.

108. Zwicky, E. D., Cooper, S. and Chapman, D.B. “Building Internet


Firewalls”, OReilly and Associates, 2000.

You might also like